-
2
-
-
85012229582
-
Security in the cloud
-
G. Anthes. Security in the cloud. Commun. ACM, 53(11):16-18, 2010.
-
(2010)
Commun ACM
, vol.53
, Issue.11
, pp. 16-18
-
-
Anthes, G.1
-
3
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Commun. ACM, 53(4):50-58, 2010.
-
(2010)
Commun ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
84905240016
-
Getting consensus for data replication: Technical perspective
-
P. A. Bernstein. Getting consensus for data replication: Technical perspective. Commun. ACM, 57(8):92-92, 2014.
-
(2014)
Commun ACM
, vol.57
, Issue.8
, pp. 92
-
-
Bernstein, P.A.1
-
5
-
-
79955971286
-
DepSky: Dependable and secure storage in a cloud-of-clouds
-
A. Bessani, M. Correia, B. Quaresma, F. Andŕe, and P. Sousa. DepSky: dependable and secure storage in a cloud-of-clouds. In Proc. of the EuroSys, pages 31-46, 2011.
-
(2011)
Proc. of the EuroSys
, pp. 31-46
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
Andŕe, F.4
Sousa, P.5
-
8
-
-
82655182931
-
Windows Azure Storage: A highly available cloud storage service with strong consistency
-
B. Calder, J. Wang, A. Ogus, N. Nilakantan, et al. Windows Azure Storage: A highly available cloud storage service with strong consistency. In Proc. of the ACM Symposium on Operating Systems Principles (SOSP), pages 143-157, 2011.
-
(2011)
Proc. of the ACM Symposium on Operating Systems Principles (SOSP
, pp. 143-157
-
-
Calder, B.1
Wang, J.2
Ogus, A.3
Nilakantan, N.4
-
9
-
-
84855668211
-
Position paper: Why are there so many vulnerabilities in web applications?
-
W. Du, K. Jayaraman, X. Tan, T. Luo, and S. Chapin. Position Paper: Why Are There So Many Vulnerabilities in Web Applications? In Proc. of the New Security Paradigms Workshop (NSPW), 2011.
-
(2011)
Proc. of the New Security Paradigms Workshop (NSPW
-
-
Du, W.1
Jayaraman, K.2
Tan, X.3
Luo, T.4
Chapin, S.5
-
10
-
-
37349004156
-
Recommendation for block cipher modes of operation: The ccm mode for authentication and confidentiality
-
M. Dworkin. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. In NIST Special Publication 800-38C.
-
NIST Special Publication 800-38C
-
-
Dworkin, M.1
-
14
-
-
84863181209
-
Depot: Cloud storage with minimal trust
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud Storage with Minimal Trust. ACM Trans. Comput. Syst., 29(4):1-38, 2011.
-
(2011)
ACM Trans. Comput. Syst
, vol.29
, Issue.4
, pp. 1-38
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
16
-
-
85032616916
-
Enabling security in cloud storage SLAs with CloudProof
-
R. A. Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with CloudProof. In Proc. of the USENIX Annual Technical Conference, 2011.
-
(2011)
Proc. of the USENIX Annual Technical Conference
-
-
Popa, R.A.1
Lorch, J.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
17
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy, 8(6):24-31, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
19
-
-
0018480001
-
A majority consensus approach to concurrency control for multiple copy databases
-
R. H. Thomas. A majority consensus approach to concurrency control for multiple copy databases. ACM Transactions on Database Systems (TODS), 4(2):180-209, 1979.
-
(1979)
ACM Transactions on Database Systems (TODS
, vol.4
, Issue.2
, pp. 180-209
-
-
Thomas, R.H.1
-
21
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput., 5(2):220-232, 2012.
-
(2012)
IEEE Trans. Serv. Comput
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
24
-
-
84968876633
-
Automatic detection of information leakage vulnerabilities in browser extensions
-
R. Zhao, C. Yue, and Q. Yi. Automatic detection of information leakage vulnerabilities in browser extensions. In Proc. of the International Conference on World Wide Web (WWW), pages 1384-1394, 2015.
-
(2015)
Proc. of the International Conference on World Wide Web
, pp. 1384-1394
-
-
Zhao, R.1
Yue, C.2
Yi, Q.3
-
25
-
-
84960979972
-
-
Amazon Cloud Drive
-
Amazon Cloud Drive. http://www.amazon.com/gp/feature.html?ie= UTF8&docId=1000828861.
-
-
-
-
26
-
-
84960979973
-
-
Box Cloud Storage
-
Box Cloud Storage. https://www.box.com/.
-
-
-
-
27
-
-
84960979974
-
-
Dropbox Cloud Storage
-
Dropbox Cloud Storage. https://www.dropbox.com/.
-
-
-
-
28
-
-
84960979975
-
-
Google Drive
-
Google Drive. https://drive.google.com/.
-
-
-
-
29
-
-
84960979976
-
-
HomeBank
-
HomeBank. http://homebank.free.fr.
-
-
-
-
30
-
-
85027085530
-
-
HP Cloud Object Storage
-
HP Cloud Object Storage. https://www.hpcloud.com/products/object-storage.
-
-
-
-
31
-
-
84960979978
-
-
iCloud
-
iCloud. http://www.apple.com/icloud/.
-
-
-
-
32
-
-
85027082052
-
-
iCloud Data Breach
-
iCloud Data Breach. http://www.forbes.com/sites/davelewis/2014/09/02/icloud-data-breach-hacking-And-nude-celebrity-photos/.
-
-
-
-
33
-
-
84960979980
-
-
Microsoft OneDrive
-
Microsoft OneDrive. http://windows.microsoft.com/en-us/onedrive/skydrive-To-onedrive.
-
-
-
-
34
-
-
84960979981
-
-
OAuth 2.0 Authorization Framework
-
OAuth 2.0 Authorization Framework. http://tools.ietf.org/html/rfc6749.
-
-
-
-
35
-
-
84960979982
-
-
OpenID 2.0
-
OpenID 2.0. http://openid.net/specs/openid-Authentication-2 0.html.
-
-
-
-
36
-
-
84960979983
-
-
SciTE: A SCIntilla based Text Editor
-
SciTE: A SCIntilla based Text Editor. http://scintilla.org/SciTE.html.
-
-
-
-
37
-
-
84960979984
-
-
Swift-OpenStack
-
Swift-OpenStack. https://wiki.openstack.org/wiki/Swift.
-
-
-
-
38
-
-
84960979985
-
-
The GNU C Library
-
The GNU C Library. http://www.gnu.org/software/libc/libc.html.
-
-
-
|